Faster dependencies with Docker

28 Apr 2016, 6 minute read

Docker is great for building portable applications, modelling complex environments locally, and helping us bridge the gap between development and production, but installing your Bundler, Bower, NPM, Maven (and so on) dependencies can make builds slow. This post explains how to speed up your builds by seeding the image with most of your dependencies, so subsequent builds aren’t hampered by the ‘all-or-nothing’ approach to updating dependencies.

A quick note on terms

This post talks about a Gemfile and Ruby’s gems, but this post applies equally to libraries and dependencies in pretty much any other language. If you’re not familiar, the Gemfile is the list of libraries, frameworks, and other 3rd party dependencies.

Rebuilding gems/NPM from scratch is slow

Docker images should contain all of the dependencies required to run your application. If we can guarantee that all our Bundler, NPM and Bower dependencies are already built into the image, we no longer need to worry about outages of rubygems.org or github.com. No contention there, right? However, building your dependencies into the Docker image comes at a cost: every time your dependency installation step happens there’s a good chance you’re blowing away every dependency you downloaded in the last build.

The Thoughtbot Rails on Docker post demonstrates how to only bundle your gems when your Gemfile changes, which at least means your dependencies aren’t re-downloaded every time the code changes. If your dependencies change regularly you’re still a bit stuck. Every time you add, remove or update a gem, the cache is invalidated and the bundle install step runs again, downloading every gem from scratch.

Brad Gessler built on that approach to leverage data volumes as a cross-container gem store. By updating the dependencies in a container you no longer need to re-build your image each time, which speeds up your development cycle immensely. This comes at a cost: by using volumes we’re maintaining state for the container which may not be obvious later on. This may be fine, after all we don’t rebuild the image every time we change the code. However if we’re pushing towards immutable infrastructure it’s reasonable to treat your gems in the same way as your OS and system dependencies. This approach also allows our environments to diverge, so a piece of code can’t be expected to behave the same way for the same container if we run it on different machines with different sets of gems installed.

The intention is solid, so how can we apply the same principles to the image build process instead?

A new solution: cache dependencies from a point in the past

We can work around Docker’s behaviour of invalidating the cache on any change to the dependencies list by seeding our image with dependencies from a static point in time. Once we have the majority of our dependencies cached, subsequent bundle installs will only need to grab the newer gems.

Install your dependencies from a source which changes infrequently. Here we’ve used the master branch of our repository, but you could use a tag or static commit and update it when your build takes too long.

Install any dependencies we didn’t get in [1]. This will just be new dependencies added in your current branch.

Add our source code (and do the rest of the build).

By grabbing our Gemfile from the master branch we get most of our dependencies up-front. The subsequent bundle install [2] then only needs to download dependencies that have been added as part of the feature branch. This means we can add and remove dependencies without fearing Docker invalidating the cache and downloading everything from scratch. Note that [2] and [3] are the popular approach to caching you’re probably already using, so all you need to do is add [1].

Suddenly Docker on rubbish hotel wifi is fun again!

An aside: this isn’t all about Ruby!

This approach isn’t Ruby specific, so you can speed up your NPM dependencies too:

Picking a seed point

The point you cache in step [1] can make all the difference to your build times, particularly if your dependencies change regularly. We’ve chosen to minimise manual intervention by using the master branch, ensuring the cache point will follow our deployed code closely. It’s also completely reasonable to use develop if you have a slower release cadence.

Getting the historical dependency list

In the above examples, we have just referenced a public GitHub repository, but chances are you’re working with private repositories or outside of GitHub. Fear not, we’ve got you covered.

Private GitHub repostories

Update (2016-07-27):It turns out that the tokens described below expire after an arbitrary amount of time, so this approach will break regularly. Stay tuned for a stable approach, using the GitHub API.

If you’re using GitHub private repositories you’re in luck: they generate per-file keys to allow you to access a file using a simple URL, e.g.:

Private repositories on BitBucket, GitLab, etc.

Most other services provide token-based access to raw files, and an exercise for the reader to work out their intricacies. This StackOverflow answer demonstrates it working for BitBucket.

Be sure to consider where your keys/tokens may be exposed. The GitHub example uses tokens specific to each file/revision pair, so the cost of an exposed key is quite small. If you’re exposing your private API key which gives write-access to your repository, things are a little different 😱😨😰.

Fallback

If you’re using something completely esoteric, you can use Docker’s RUN command in preference to ADDing them as we have above. Through RUN you can curl your files down, install a custom client, or whatever you need.

Summary / TL;DR

Using the above approach we get the benefits of cached dependencies with the benefits of quick builds and deployable artefacts.

Deployments are hard. Striking a balance between stable production builds, fast development cycles and keeping development and production as close as possible is even harder.

Speed up your Docker image build time by using a version of your dependencies list which changes less frequently to leverage Dockers caching mechanism.

One good source for the more-stable dependencies list is your GitHub repository.

Be careful not to expose your keys and secrets.

Only do this if image build time is impacting some part of your life!

Discuss!

Was this post useful? Why not help others find it by sharing on twitter. While you're there, get in touch and let me know what you think!